Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Network and Computer Security
1671-0428
2009 Issue 2
cpk shu zi qian ming he mi yue jiao huan xie yi
nan xiang hao ; li wei gang
..............page:1
A Research on Server Roaming for Mitigating DDOS Attacks
YANG Jing;ZHANG Feng-bin
..............page:3
Research on Fast Handover for Mobile IPv6
YANG Jian;GAO Jian-ling
..............page:7
Experiment of SPA Attack Against RSA
FAN Li-heng;XIANG Kai-quan;ZHAO Qiang;CHEN Kai-yan
..............page:16
A Improved Digital Watermarking Based on the B-SVD
ZHANG Deng-yin;LIU Wan
..............page:22
An Image Encryption Algorithm Based on Chaotic Theory
YANG Yi-mei;YANG yu-jun
..............page:25
Semi-Fragile Watermarking Algorithm for Color Image Accept JPEG
WANG Kong-qing;WANG Xi-chang;LIU Jiang
..............page:29
Fuzzy C Means Clustering Algorithm Based on Particle Swarm Optimizing
XIN Hai-ming;TAO Zhi-sui
..............page:33
The Choice of Watermark Embedded Region Based on Edge Detection
YUAN Bao-ling;XIA Han-zhu;CHEN Er-lei
..............page:36
The Research for Load Balancing Technology of Bigtable System
Wang Ying-dong;Kuang Yi;Fei diang-tao
..............page:41
Design and Implementation of a New Steganography Method Based on the Chinese Interpunction
CHEN Tian-ping;ZHENG Lian-qing;WANG Zhan-feng;YIN Chen-xiao
..............page:44
Research on Active-network Adaptive Intrusion Response System Based on Mobile Agents
LI Hong-xia;Wang Guang;Sun Ning;Liu La-mei
..............page:49
A Multi Domain Security Trust Based Access Control Model
Zhang Cheng-bin;Liao Zhen-song
..............page:53
Analysis and Research on the Technology of Flow Filtration in Firewall
GENG Feng-rui;GAO Zhong-he;LI Hong-wei
..............page:57
Application Research of Enhancement Computer Startup Authentication by Using GRUB
WANG Bao-ping;Cheng Xin-Dang;Zhang Xin-Gang
..............page:63
Improvement of Kerberos Agreement Based on Dynamic Password System
HUANG Jian-hua;HE Xi
..............page:66
Research on Component Technique and Software Agent
CHEN Xiao-xiang
..............page:70
Research of Data-Structure Construction Based on PMI Application
LIANG Bing;LIAO Xiang-bai
..............page:74
The Study of Alert Aggregation
HU Zhen-hua;ZHANG Yong-sheng;LU Yi-jun;Xu Zhen
..............page:77
Design and Implementatj On of Web Database for Computer Forensics Cases
ZHOU Min;GONG Jian;FU Guo-yu
..............page:81
shi wen xuan yi
qu ding
..............page:108
jie pu ssl vpn wang guan ji shu zong shu
he jian feng
..............page:102
Application of DES Encryption Algorithm in Banking Business
CHEN Jing;SHANG Xian-lian;GU Chen-yu
..............page:93
Solution to DDoS Attack Against Small Business Websites
LI Jian;GUO Xin
..............page:87